Jia-Guang Sun

Orcid: 0000-0002-5884-7939

Affiliations:
  • Tsinghua University, School of Software, Beijing, China


According to our database1, Jia-Guang Sun authored at least 244 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Building Dynamic System Call Sandbox with Partial Order Analysis.
Proc. ACM Program. Lang., October, 2023

Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts.
ACM Trans. Softw. Eng. Methodol., May, 2023

PHCG: Optimizing Simulink Code Generation for Embedded System With SIMD Instructions.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

Apache IoTDB: A Time Series Database for IoT Applications.
Proc. ACM Manag. Data, 2023

Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations.
Proceedings of the 32nd USENIX Security Symposium, 2023

Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios.
IEEE Trans. Software Eng., 2022

RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems.
IEEE Trans. Software Eng., 2022

MDD: A Unified Model-Driven Design Framework for Embedded Control Software.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Code Synthesis for Dataflow-Based Embedded Software Design.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

PATA: Fuzzing with Path Aware Taint Analysis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

HCG: optimizing embedded code generation of simulink with SIMD instruction synthesis.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
Semantic Learning and Emulation Based Cross-Platform Binary Vulnerability Seeker.
IEEE Trans. Software Eng., 2021

Semantic Learning Based Cross-Platform Binary Vulnerability Search For IoT Devices.
IEEE Trans. Ind. Informatics, 2021

Automatic Integer Error Repair by Proper-Type Inference.
IEEE Trans. Dependable Secur. Comput., 2021

RIFF: Reduced Instruction Footprint for Coverage-Guided Fuzzing.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021

2020
EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Apache IoTDB: Time-series database for Internet of Things.
Proc. VLDB Endow., 2020

Multi-Task Learning of Generalizable Representations for Video Action Recognition.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

A Multi-Player Minimax Game for Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

2019
Hypergraph-Induced Convolutional Networks for Visual Classification.
IEEE Trans. Neural Networks Learn. Syst., 2019

Vulnerable Code Clone Detection for Operating System Through Correlation-Induced Learning.
IEEE Trans. Ind. Informatics, 2019

Polar: Function Code Aware Fuzz Testing of ICS Protocol.
ACM Trans. Embed. Comput. Syst., 2019

Dependable Model-driven Development of CPS: From Stateflow Simulation to Verified Implementation.
ACM Trans. Cyber Phys. Syst., 2019

Tolerating C Integer Error via Precision Elevation.
IEEE Trans. Computers, 2019

Improve Language Modeling for Code Completion Through Learning General Token Repetition of Source Code with Optimized Memory.
Int. J. Softw. Eng. Knowl. Eng., 2019

RNN-Test: Adversarial Testing Framework for Recurrent Neural Network Systems.
CoRR, 2019

GasFuzz: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability.
CoRR, 2019

EVMFuzz: Differential Fuzz Testing of Ethereum Virtual Machine.
CoRR, 2019

Industry practice of coverage-guided enterprise Linux kernel fuzzing.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Enabling clone detection for ethereum via smart contract birthmarks.
Proceedings of the 27th International Conference on Program Comprehension, 2019

Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Go-clone: graph-embedding based clone detector for Golang.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

VFQL: combinational static analysis as query language.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Engineering a Better Fuzzer with Synergically Integrated Optimizations.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

Vetting API usages in C programs with IMChecker.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

A Sensor Attack Detection Method in Intelligent Vehicle with Multiple Sensors.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to Analysis.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Beyond Pairwise Matching: Person Reidentification via High-Order Relevance Learning.
IEEE Trans. Neural Networks Learn. Syst., 2018

Constructing Cost-Aware Functional Test-Suites Using Nested Differential Evolution Algorithm.
IEEE Trans. Evol. Comput., 2018

Temporal Coverage Analysis for Dynamic Verification.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

QuanFuzz: Fuzz Testing of Quantum Program.
CoRR, 2018

Parallelizing SMT solving: Lazy decomposition and conciliation.
Artif. Intell., 2018

EClone: detect semantic clones in Ethereum via symbolic transaction sketch.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

PAFL: extend fuzzing optimizations of single mode to industrial parallel mode.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

DLFuzz: differential fuzzing testing of deep learning systems.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

S-gram: towards semantic-aware security auditing for Ethereum smart contracts.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

VulSeeker: a semantic learning based vulnerability seeker for cross-platform binary.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

SAFL: increasing and accelerating testing coverage with symbolic execution and guided fuzzing.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Weak-assert: a weakness-oriented assertion recommendation toolkit for program analysis.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Scalable and Extensible Static Memory Safety Analysis with Summary over Access Path.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

Scalable Verification Framework for C Program.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Data-Centered Runtime Verification of Wireless Medical Cyber-Physical System.
IEEE Trans. Ind. Informatics, 2017

Formal Modeling and Verification of a Rate-Monotonic Scheduling Implementation with Real-Time Maude.
IEEE Trans. Ind. Electron., 2017

Representative band selection for hyperspectral image classification.
J. Vis. Commun. Image Represent., 2017

Memetic-based schedule synthesis for communication on time-triggered embedded systems.
Int. J. Distributed Sens. Networks, 2017

Verification of Implementations of Cryptographic Hash Functions.
IEEE Access, 2017

A language model for statements of software code.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

A static analysis tool with optimizations for reachability determination.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

IntPTI: automatic integer error repair with proper-type inference.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Vertex-Weighted Hypergraph Learning for Multi-View Object Classification.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Stochastic optimization of program obfuscation.
Proceedings of the 39th International Conference on Software Engineering, 2017

Dependable integrated clinical system architecture with runtime verification.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

Assertion Recommendation for Formal Program Verification.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A Constraint-Pattern Based Method for Reachability Determination.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Deep Learning of Transferable Representation for Scalable Domain Adaptation.
IEEE Trans. Knowl. Data Eng., 2016

Efficient Recovery of Missing Events.
IEEE Trans. Knowl. Data Eng., 2016

An Energy-Efficient Train Control Framework for Smart Railway Transportation.
IEEE Trans. Computers, 2016

Task and Participant Scheduling of Trading Platforms in Vehicular Participatory Sensing Networks.
Sensors, 2016

From Stateflow Simulation to Verified Implementation: A Verification Approach and A Real-Time Train Controller Design.
Proceedings of the 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2016

Tsmart-BIPEX: An Integrated Graphical Design Toolkit for Software Systems.
Proceedings of the MoDELS 2016 Demo and Poster Sessions co-located with ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2016), 2016

C Code Verification based on the Extended Labeled Transition System Model.
Proceedings of the MoDELS 2016 Demo and Poster Sessions co-located with ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2016), 2016

Model driven design of heterogeneous synchronous embedded systems.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Verifying simulink stateflow model: timed automata approach.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Use runtime verification to improve the quality of medical care practice.
Proceedings of the 38th International Conference on Software Engineering, 2016

Taming Interrupts for Verifying Industrial Multifunction Vehicle Bus Controllers.
Proceedings of the FM 2016: Formal Methods, 2016

Safety-Assured Formal Model-Driven Design of the Multifunction Vehicle Bus Controller.
Proceedings of the FM 2016: Formal Methods, 2016

Automatic Fix for C Integer Errors by Precision Improvement.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
First, Debug the Test Oracle.
IEEE Trans. Software Eng., 2015

Mechanism Design for Finding Experts Using Locally Constructed Social Referral Web.
IEEE Trans. Parallel Distributed Syst., 2015

Design of Mixed Synchronous/Asynchronous Systems with Multiple Clocks.
IEEE Trans. Parallel Distributed Syst., 2015

Domain Invariant Transfer Kernel Learning.
IEEE Trans. Knowl. Data Eng., 2015

Design and Optimization of Multiclocked Embedded Systems Using Formal Techniques.
IEEE Trans. Ind. Electron., 2015

Scalable Verification of a Generic End-Around-Carry Adder for Floating-Point Units by Coq.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Generalized interface automata with multicast synchronization.
Frontiers Comput. Sci., 2015

Identifying and constructing elemental parts of shafts based on conditional random fields model.
Comput. Aided Des., 2015

PLC programs' checking method and strategy based on module state transfer.
Proceedings of the IEEE International Conference on Information and Automation, 2015

2014
Continuity Transition with a Single Regular Curved-Knot Spline Surface.
ACM Trans. Graph., 2014

Symbolic Analysis of Programmable Logic Controllers.
IEEE Trans. Computers, 2014

Array Theory of Bounded Elements and its Applications.
J. Autom. Reason., 2014

Modeling a Heterogeneous Embedded System in Coloured Petri Nets.
J. Appl. Math., 2014

Functional Verification of High Performance Adders in COQ.
J. Appl. Math., 2014

A New Barrier Certificate for Safety Verification of Hybrid Systems.
Comput. J., 2014

Polynomial spline interpolation of incompatible boundary conditions with a single degenerate surface.
Comput. Aided Des., 2014

iDola: Bridge Modeling to Verification and Implementation of Interrupt-Driven Systems.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Application-Specific Architecture Selection for Embedded Systems via Schedulability Analysis.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Tsmart-GalsBlock: a toolkit for modeling, validation, and synthesis of multi-clocked embedded systems.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Clause Replication and Reuse in Incremental Temporal Induction.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Matching heterogeneous events with patterns.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Transfer Joint Matching for Unsupervised Domain Adaptation.
Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014

From offline to onboard system solution for a control sequence optimization problem.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence for Engineering Solutions, 2014

Optimal robust control for generalized fuzzy dynamical systems: A novel use on fuzzy uncertainties.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Control and Automation, 2014

2013
Bayesian-Network-Based Reliability Analysis of PLC Systems.
IEEE Trans. Ind. Electron., 2013

A Unified Framework for DPLL(T) + Certificates.
J. Appl. Math., 2013

An octree-based proxy for collision detection in large-scale particle systems.
Sci. China Inf. Sci., 2013

System reliability calculation based on the run-time analysis of ladder program.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Design and optimization of multi-clocked embedded systems using formal technique.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Transfer Feature Learning with Joint Distribution Adaptation.
Proceedings of the IEEE International Conference on Computer Vision, 2013

Transfer Sparse Coding for Robust Image Representation.
Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013

Verification and Implementation of the Protocol Standard in Train Control System.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Sequential dependency and reliability analysis of embedded systems.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

2012
Recovering Geometric Detail by Octree Normal Maps.
Trans. Edutainment, 2012

New strategies for reliability analysis of Programmable Logic Controllers.
Math. Comput. Model., 2012

Semantic characterization of programmable logic controller programs.
Math. Comput. Model., 2012

Obtaining more Karatsuba-like formulae over the binary field.
IET Inf. Secur., 2012

Modeling and Validation of PLC-Controlled Systems: A Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Uncertain Model and Algorithm for Hardware/Software Partitioning.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012

Automatic image annotation using tag-related random search over visual neighbors.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Verifying workflow processes: a transformation-based approach.
Softw. Syst. Model., 2011

<i>G</i><sup><i>n</i></sup> filling orbicular <i>N</i>-sided holes using periodic B-spline surfaces.
Sci. China Inf. Sci., 2011

A Hierarchical Grid Based Framework for Fast Collision Detection.
Comput. Graph. Forum, 2011

E.G<sup>2</sup> B-spline surface interpolation.
Comput. Aided Geom. Des., 2011

A new method for identifying and validating features from 2D sectional views.
Comput. Aided Des., 2011

G<sup>2</sup> B-spline interpolation to a closed mesh.
Comput. Aided Des., 2011

Proving Computational Geometry Algorithms in TLA+2.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

Parallel Spatial Hashing for Collision Detection of Deformable Surfaces.
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011

2010
Filling <i>n</i>-sided regions with <i>G</i><sup>1</sup> triangular Coons B-spline patches.
Vis. Comput., 2010

Integrating Evolutionary Computation with Abstraction Refinement for Model Checking.
IEEE Trans. Computers, 2010

Overlap-free Karatsuba-Ofman polynomial multiplication algorithms.
IET Inf. Secur., 2010

A cell-based algorithm for evaluating directional distances in GIS.
Int. J. Geogr. Inf. Sci., 2010

A point-in-polygon method based on a quasi-closest point.
Comput. Geosci., 2010

Mining process models with prime invisible tasks.
Data Knowl. Eng., 2010

A workflow net similarity measure based on transition adjacency relations.
Comput. Ind., 2010

G<sup>n</sup> blending multiple surfaces in polar coordinates.
Comput. Aided Des., 2010

Identification of sections from engineering drawings based on evidence theory.
Comput. Aided Des., 2010

Reconstructing 3D Objects from 2D Sectional Views of Engineering Drawings Using Volume-Based Method.
Proceedings of the SMI 2010, 2010

The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes.
Proceedings of the SMI 2010, 2010

A Watermark-Aware Trusted Running Environment for Software Clouds.
Proceedings of the Fifth Annual ChinaGrid Conference, ChinaGrid 2010, Guangzhou, 2010

A cloud based SIM DRM scheme for the mobile internet.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
A novel approach for process mining based on event types.
J. Intell. Inf. Syst., 2009

QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector.
J. Comput. Sci. Technol., 2009

Workflow-based resource allocation to optimize overall performance of composite services.
Future Gener. Comput. Syst., 2009

Heuristic-Guided Abstraction Refinement.
Comput. J., 2009

Task-activity based access control for process collaboration environments.
Comput. Ind., 2009

A torus patch approximation approach for point projection on surfaces.
Comput. Aided Geom. Des., 2009

2008
Efficient Fingercode Classification.
IEICE Trans. Inf. Syst., 2008

A semi-automatic approach for workflow staff assignment.
Comput. Ind., 2008

Approximate computation of curves on B-spline surfaces.
Comput. Aided Des., 2008

Reducing control points in lofted B-spline surface interpolation using common knot vector determination.
Comput. Aided Des., 2008

Towards trace semantics for WS-CDL with alignments.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

2007
AbIx: An Approach to Content-Based Approximate Query Processing in Peer-to-Peer Data Systems.
J. Comput. Sci. Technol., 2007

Mining process models with non-free-choice constructs.
Data Min. Knowl. Discov., 2007

An offset algorithm for polyline curves.
Comput. Ind., 2007

A counterexample on point inversion and projection for NURBS curve.
Comput. Aided Geom. Des., 2007

Mining Invisible Tasks from Event Logs.
Proceedings of the Advances in Data and Web Management, 2007

Converting hybrid wire-frames to B-rep models.
Proceedings of the 2007 ACM Symposium on Solid and Physical Modeling, 2007

A machine learning approach to semi-automating workflow staff assignment.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

MuSQL: A Music Structured Query Language.
Proceedings of the Advances in Multimedia Modeling, 2007

Dynamically Constructing Mixed Pyramid for Fast VQ Encoding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Using Decision Tree Learning to Predict Workflow Activity Time Consumption.
Proceedings of the ICEIS 2007, 2007

Effective heuristics for counterexample-guided abstraction refinement.
Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, 2007

Intersection Testing between an Ellipsoid and an Algebraic Surface.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

2006
Probabilistic optimization for FPGA board level routing problems.
IEEE Trans. Circuits Syst. II Express Briefs, 2006

A combinatorial congestion estimation approach with generalized detours.
Comput. Math. Appl., 2006

Reconstruction of 3D curvilinear wire-frame from three orthographic views.
Comput. Graph., 2006

A rational extension of Piegl's method for filling <i>n</i>-sided holes.
Comput. Aided Des., 2006

A quasi-Monte Carlo method for computing areas of point-sampled surfaces.
Comput. Aided Des., 2006

Automatic least-squares projection of points onto point clouds with applications in reverse engineering.
Comput. Aided Des., 2006

Solid reconstruction using recognition of quadric surfaces from orthographic views.
Comput. Aided Des., 2006

Computing minimum distance between two implicit algebraic surfaces.
Comput. Aided Des., 2006

An Efficient Algorithm for Fingercode-Based Biometric Identification.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Constrained Delaunay Triangulation Using Delaunay Visibility.
Proceedings of the Advances in Visual Computing, Second International Symposium, 2006

Optimal Parameterizations of Bézier Surfaces.
Proceedings of the Advances in Visual Computing, Second International Symposium, 2006

Surface Fitting to Curves with Energy Control.
Proceedings of the Advances in Visual Computing, Second International Symposium, 2006

Using <i>pi</i>-Calculus to Formalize Domain Administration of RBAC.
Proceedings of the Information Security Practice and Experience, 2006

Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams.
Proceedings of the 22nd International Conference on Data Engineering, 2006

A Distributed Domain Administration of RBAC Model in Collaborative Environments.
Proceedings of the 10th International Conference on CSCW in Design, 2006

A Probabilistic Learning Approach for Counterexample Guided Abstraction Refinement.
Proceedings of the Automated Technology for Verification and Analysis, 2006

Detecting Implicit Dependencies Between Tasks from Event Logs.
Proceedings of the Frontiers of WWW Research and Development, 2006

Hierarchical Hypercube-Based Pairwise Key Establishment Schemes for Sensor Networks.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Mesh blending.
Vis. Comput., 2005

Efficient vector quantization using genetic algorithm.
Neural Comput. Appl., 2005

Multiterminal net assignments by scatter search.
Math. Comput. Model., 2005

On Theoretical Upper Bounds for Routing Estimation.
J. Univers. Comput. Sci., 2005

On synthesis of 3 × 3 reversible logic functions.
Int. J. Comput. Math., 2005

An algorithm for tetrahedral mesh generation based on conforming constrained Delaunay tetrahedralization.
Comput. Graph., 2005

A new algorithm for Boolean operations on general polygons.
Comput. Graph., 2005

A robust algorithm for finding the real intersections of three quadric surfaces.
Comput. Aided Geom. Des., 2005

Synthesizing 2D directional moving texture.
Proceedings of the Spring Conference on Computer Graphics, 2005

Secure Anonymous Communication with Conditional Traceability.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

A Hierachical Method for Wiring and Congestion Prediction.
Proceedings of the 2005 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2005), 2005

Segmented channel routing with pin rearrangements via satisfiability.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Convergence Analysis of Discrete Differential Geometry Operators over Surfaces.
Proceedings of the Mathematics of Surfaces XI, 2005

An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Information Push-Delivery for User-Centered and Personalized Service.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Integrating Collaborate and Content-Based Filtering for Personalized Information Recommendation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Facial Features Location by Analytic Boosted Cascade Detector.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Efficient Example-Based Painting and Synthesis of 2D Directional Texture.
IEEE Trans. Vis. Comput. Graph., 2004

A stochastic model for cellassignments in PCS networks.
Math. Comput. Model., 2004

Improving Retrieval Performance by Region Constraints and Relevance Feedback.
J. Comput. Sci. Technol., 2004

Constraint Based Region Matching for Image Retrieval.
Int. J. Comput. Vis., 2004

Automatic G1 arc spline interpolation for closed point set.
Comput. Aided Des., 2004

Application of Content Computing in Honeyfarm.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Rules Discovery from Cross-Sectional Short-Length Time Series.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

Dynamic Symbolization of Streaming Time Series.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2004

Anomaly Detection in Grid Computing Based on Vector Quantization.
Proceedings of the Grid and Cooperative Computing, 2004

Symbolization of Mobile Object Trajectories with the Support to Motion Data Mining.
Proceedings of the Conceptual Modeling for Advanced Application Domains, 2004

Alternate Pattern Fill.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Shelling Algorithm in Solid Modeling.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Real-Time Texture Synthesis with Patch Jump Maps.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Up to Face Extrusion Algorithm for Generating B-Rep Solid.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Bilateral Filter for Meshes Using New Predictor.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Alternating Direction Finite Element Method for a Class of Moving Boundary Problems.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Enhancing the Scalability of the Community Authorization Service for Virtual Organizations.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Real-Time Emulation of Intrusion Victim in HoneyFarm.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Adaptive tree similarity learning for image retrieval.
Multim. Syst., 2003

Security middleware for enhancing interoperability of Public Key Infrastructure.
Comput. Secur., 2003

Lightweight security for mobile commerce transactions.
Comput. Commun., 2003

Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

A New Heuristic Reduct Algorithm Base on Rough Sets Theory.
Proceedings of the Advances in Web-Age Information Management, 2003

Clustering Individuals in Non-vector Data and Predicting: A Novel Model-Based Approach.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003

GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files.
Proceedings of the Advances in Web-Based Learning, 2003

GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

GFS-Btree: A Scalable Peer-to-Peer Overlay Network for Lookup Service.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Two Accelerating Techniques for 3D Reconstruction.
J. Comput. Sci. Technol., 2002

Modeling workflow processes with colored Petri nets.
Comput. Ind., 2002

A constructive approach to solving 3-D geometric constraint systems using dependence analysis.
Comput. Aided Des., 2002

2001
Direct manipulation of FFD: efficient explicit solutions and decomposible multiple point constraints.
Vis. Comput., 2001

CIM Algorithm for Approximating Three-Dimensional Polygonal Curves.
J. Comput. Sci. Technol., 2001

Degree reduction of B-spline curves.
Comput. Aided Geom. Des., 2001

Reconstruction of curved solids from engineering drawings.
Comput. Aided Des., 2001

Approximate merging of a pair of Bézier curves.
Comput. Aided Des., 2001

An Effective Feature-Preserving Mesh Simplification Scheme Based on Face Constriction.
Proceedings of the 9th Pacific Conference on Computer Graphics and Applications, 2001

On the Numerical Redundancies of Geometric Constraint Systems.
Proceedings of the 9th Pacific Conference on Computer Graphics and Applications, 2001

2000
Bisection algorithms for approximating quadratic Bézier curves by G<sub>1</sub> arc splines.
Comput. Aided Des., 2000

A Matrix-Based Approach to Reconstruction of 3D Objects from Three Orthographic Views.
Proceedings of the 8th Pacific Conference on Computer Graphics and Applications, 2000

1999
A note on approximation of discrete data by G1 arc splines.
Comput. Aided Des., 1999

1996
Advanced geometric modeler with hybrid representation.
J. Comput. Sci. Technol., 1996


  Loading...